Shaarli export of all bookmarks on Wed, 27 Sep 17 22:04:54 -0400
- 7 Fun Podcasts for Kids (That Parents Love, Too)
- Packet radio lives on through open source software | Opensource.com
- You Need Configuration Management. Really. (Thwack) - MovingPackets.net
- Collect SSH Keys with Ansible « ipSpace.net by @ioshints
- WannaCry ransomware explained: What it is, how it infects, and who was responsible | CSO Online
- CBS's Showtime sites silently used Monero Miners on user's browsers
- Exploring the Air Gap Myth
- Equifax CEO retires
- Do's and Don'ts of Securing a Domain Name
- Bitdefender Ransomware Recognition Tool – Bitdefender Labs
- San Francisco sues Equifax over poor cybersecurity practices
- Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards
- Fast Food Chain Sonic Drive-In Investigating Possible Card Breach
- EHR Certification Changes: Risks for Healthcare Providers
- Google Online Security Blog: Broadening HSTS to secure more of the Web
- Do CISOs Need to 'Dumb Down' Cybersecurity for Boards?
- Trojanized CCleaner Investigation: Lucky Break
- vRealize Operation 6.6 “hidden” enhancement | KISSTIBOR.info
- 10 Ways to Troubleshoot Poor VM Performance
- How to get started with Network Virtualisation and NSX
- Vanguard Thoughts: Pros and Cons from a 15-Year Client-Owner — My Money Blog
- 15 Veggie Noodle Dishes That Will Make You Forget About Pasta
- Security Tools to Check for Viruses and Malware on Linux | Linux.com | The source for Linux information
- SEC Chair Wants More Cyber Risk Disclosure From Public Firms
- Is a 15-Year Mortgage a Good Idea?
- Errata Security: 5 years with home NAS/RAID
- Will the Equifax Data Breach Finally Spur the Courts (and Lawmakers) to Recognize Data Harms? | Electronic Frontier Foundation
- FBI's Freese Shares Risk Management Tips
- How to Install Ubuntu via PXE Server Using Local DVD Sources
- Being Compliant is Not Being Secure - Your Business is Still at Risk!Webinar.
- 21 ss Command Examples In Linux
- The Importance of HTTP Strict Transport Security (HSTS) - RootUsers
- Configure Firewall Rules for Multiple Profiles Using Group Policy - RootUsers
- 8 digital skills we must teach our children | World Economic Forum
- What made Porting Microsoft SQL Server to Linux to be the right move after all – Slava Oks's WebLog
- How to reset IE11 to default configuration via a script? – We know IE!
- An Introduction to Solid State Relays | Hackaday
- Peter Block on small group working (Gurteen Knowledge)
- Building a 12V 110Ah battery bank using 80 32650 LiFePO4 cells « Dangerous Prototypes
- Kitchen Soap – Invited article in IEEE Software – Technical Debt: Challenges and Perspectives
- Welcome to the Sapiezoic – Jon Udell
- The Electronics Markets of Ho Chi Minh City, Vietnam | Hackaday
- Cuban Embassy Attacks and The Microwave Auditory Effect | Hackaday
- Cybercrime is costing each business a whopping $11.7M a year, report says - TechRepublic
- Cyber Security and Data Integrity Problems Within the GAMP 5 Validation Process
- Equifax Data Breach Prompts Calls For Tougher ...
- How I come up with topics for my blog posts - SharePoint Maven
- Gluster » Storage can make your digital transformation—or break it
- Organizations unprepared for the ransomware onslaught
- Ransomware attacks affect five percent of SMBs
- Healthcare sector accounts for most cyber security incidents
- NBlog - the NoticeBored blog: NBlog September 24 - five-step bulletproofing?
- Redboot malware leaves researchers wondering if its a ransomware or wiper
- Deloitte Breach Affected All Company Email, Admin Accounts
- Time to Embrace a Security Management Plane in the Cloud | CSO Online
- Who decides when you need to update vulnerable software? (Equifax)
- How to Install and Configure Jenkins Server on CentOS 7 to Automate Your WordPress Tasks
- How to find disk I/O latency with ioping monitoring tool on Linux – nixCraft
- Maximizing IT’s Impact with Microsoft 365 Powered Devices – Enterprise Mobility and Security Blog
- Am I a DBA 3.0 or just an SQL*DBA? - Blog dbi services
- 23 Hardening Tips to Secure your Linux Server
- Golden walk - Japan Today
- Celebrating the completion of the most advanced subsea cable across the Atlantic - The Official Microsoft Blog
- GitHub - jturgasen/my-links: A collection of OSS tools and handy links
- GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources
- AUTOMATED SECURITY HARDENING OF RED HAT ENTERPRISE LINUX V5 IN ACCORDANCE WITH DISA STANDARDS
- Security Compliance Manager (SCM)
- Top 10 Security Hardening Settings for Windows Servers and Active Directory
- NIST Cybersecurity Framework Impacting Your Company?
- Wekan — open-source kanban
- Welcome to COSO
- Updated COSO framework will help audit committees comply with SOX
- Defining a Baseline for Improvement | BPMInstitute.org
- Apache jclouds® :: Home
- COSO Framework 2013 & SOX Compliance
- SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners
- SAS 70, SSAE 16, SOC and Data Center Standards | Data Center Knowledge
- SOC 1 & SOC 2 Preparation Checklist | The SSAE 18 Reporting Standard - SOC 1 - SOC 2 - SOC 3
- The Cyborg Institute — Cyborg Institute
- HIPPA PCI-DSS Policy Mapping Table
- Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
- Meeting Compliance Efforts with the Mother of All Control Lists (MOACL)
- Sarbanes-Oxley Information Technology Compliance Audit
- CIS Controls
- Hitask - Easy Project and Task Management for Teams
- check_mk/cisco_checkconfigsecurity at master · reca/check_mk · GitHub
- Cyberstates 2017
- 2017 IT Industry Job Market & Salary Trends Analysis | Cyberstates by CompTIA
- 17 pen testing tools the pros use | CSO Online
- HP unveils its insanely upgradeable Z-class workstations
- Exxact Corporation
- Using GPUs in KVM Virtual Machines
- Secure Deployment Guide for NetScaler MPX, VPX, and SDX Appliances
- The NeXT Years: Steve Jobs before His Triumphant Return to Apple | Low End Mac
- Cybersecurity Firms Underwhelm Despite Increased Investor Interest
- Why Equifax’s error wasn’t hiring someone with a music degree
- Learn Linux System Auditing with Auditd Tool on CentOS/RHEL
- How To Use Ping, fping, and Gping For Varies Purpose In Linux | 2daygeek: Linux Howtos, Tutorials, Guides, Linux Tips & Tricks
- How to Query Audit Logs Using 'ausearch' Tool on CentOS/RHEL
- Equifax has been sending customers to a fake phishing site for weeks – Naked Security
- OSSIM: CIS Critical Security Controls Assessment in a Windows Environment.
- Cheat sheet: How to become a cybersecurity pro - TechRepublic
- Health IT & Cybersecurity: 5 Hiring Misconceptions ...
- Equifax Data Breach: The Essential Protection Guide to Secure Your Data
- Powershell Functions for tags | Virtual Me
- 832 TB – ZFS on Linux – Configuring Storage: Part 3 | JonKensy.com
- 832 TB – ZFS on Linux – Setting Up Ubuntu: Part 2 | JonKensy.com
- 832 TB – ZFS on Linux – Project “Cheap and Deep”: Part 1 | JonKensy.com
- Calibrate Your Monitor - The Lone Sysadmin
- Linked - Tesla Remotely Extended The Range Of Drivers In Florida For Free... And That's NOT A Good Thing
- Veritas can reach APAC customers via GDPR | ZDNet
- Equifax Breach: Setting the Record Straight — Krebs on Security
- How BitPaymer ransomware covers its tracks – Naked Security
- Equifax hackers likely in network since March
- Hackers hold entire school district to ransom – Naked Security
- After massive data breach, Equifax sent victims to fake phishing site for support - TechRepublic
- Equifax breach has some calling for a credit reporting industry 'rethink'
- A look at how this small business is preparing for the GDPR
- SEC Says Intruders May Have Accessed Insider Data ...
- Equifax's May Mega-Breach Might Trace to March Hack
- Canada’s Tough New Breach Reporting Regulations
- SMBs Paid $301 Million to Ransomware Attackers
- IDM OIM Blog: How to setup mrepo Redhat 7
- How To Find Vulnerable Packages In Arch Linux - OSTechNix
- What is Kubernetes? – Marksei
- Cloud Design Patterns – Availability – Premier Developer
- Health Insurance Premiums: Average Annual Cost $19,000 Family, $6,000 Individual — My Money Blog
- FedEx estimates ransomware attack cost $300 million
- Experian makes it easy for someone to undo your credit freeze
- Equifax Confirms Another 'Security Incident' : The Two-Way : NPR
- Following Equifax, Focus On Database Encryption - IT Jungle
- Need a Night-Light? | Hackaday
- The practical guide to fighting ransomware
- New security platform uses live attacks to evaluate risk
- Is DevOps the Best Thing to Ever Happen to Security? - Blog | Tenable™
- 8 best practices for managing software patches - TechRepublic
- 5 tips for enterprises to ensure their SMB partners don't cause a data breach - TechRepublic
- A Modern Hypervisor as a Basis for a Sandbox - Securelist
- Hardening Apache Struts with SELinux – DoublePulsar
- PCI's Data Security Standards at a Glance
- WannaCry and Hollywood hospital ransomware attacks crossed a line for some cybercriminals
- Report: Negligent employees are no. 1 cause of cybersecurity breaches at SMBs - TechRepublic
- Understand the dangers of OSS? Equifax means you have to
- Equifax names interim CSO, CIO;
- Heads roll, as it's revealed Equifax's IT team knew about web app vulnerability
- Equifax Disputes Report of Undisclosed Breach From March
- Security Alert: Cyber Criminals Slip Backdoor in CCleaner to Potentially Spread Malware
- An intro to machine learning | Opensource.com
- How to use Let's Encrypt to secure your websites | ZDNet
- Why Adding Technical Experts to Boards Is Urgent
- sysbench Histograms: A Helpful Feature Often Overlooked - Percona Database Performance Blog
- Medical Supply Firm Hacked; Log Review Key to Detection
- HHS Incident Response Will Be Scrutinized - HealthcareInfoSecurity
- The 6 phases of adopting cloud security practices | CSO Online
- Siemens' New ICS/SCADA Security Service a Sign of ...
- Oracle 12.2 underscores appear in SPFILE - be aware when you flashback
- Sizing Windows 2016, Windows 2012 and Windows 10 Virtual Machines | Ask the Architect
- Upgrading Debian 8 to version 9 - Fun with virtualizationFun with virtualization
- Oracle 12.2 Adaptive Features are enabled in Oracle 12.1.0.2 Windows BPs
- Netool.io – A simple to use passive network port analyzer that gives you the information you need.
- CentOS 7 Server Hardening Guide | Lisenet.com :: Linux | Security | Networking
- On the Beauty of Python's ExitStack — Nikolaus Rath's Website
- SSD Caching under Linux — Nikolaus Rath's Website
- DSHR's Blog: Attacking (Users Of) The Wayback Machine
- The Science Behind Lithium Cell Characteristics and Safety | Hackaday
- 10 Things You Always Wanted to Know About Arduino
- Partner Post: Monitoring of BizTalk Server using BizTalk360 – BizTalk Team Blog
- 7 More Lesser-known Debugging Tactics for Visual Studio | The Visual Studio Blog
- Getting Started in Offensive Security · System Overlord
- Whose Fault Is It? (A brief discussion on misconceptions about Equifax) | tisiphone.net
- Equifax Hit with Lawsuit
- Isilon Tech Refresh - Replacing old NL400 Isilon nodes for NL410's - FastStorage
- Equifax Exec Departures Raise Questions About ...
- How to implement SharePoint in 5 meetings - SharePoint Maven
- 7 tips for Linux cluster admins to help keep auditors happy
- How to avoid a GDPR compliance audit: Best practices | The Enterprisers Project
- Download / use Oracle Database Security Assessment Tool DBSAT
- Active Directory Access Control List – Attacks and Defense – Enterprise Mobility and Security Blog
- Public cloud has forced change | Virtual Me
- After Equifax Hack, Consumers Are On Their Own. Here Are 6 Tips To Protect Your Data : NPR
- Equifax stock sales prompt DOJ investigation for insider trading
- Equihax: One of the Most Calamitous Breaches of All Time
- Equifax data breach: Time to do a 15 minute cybersecurity makeover
- ROCK NSM
- VMware vSphere and ESXi - Create a 'Logon Banner' | PeteNetLive
- Backup and Restore of VCSA 6.5
- Integrate new firewalls into Panorama via CLI | sitweak
- IOIOBox
- Equifax confirms up to 400,000 UK consumers at risk after data breach
- Three CIO survival lessons: 'Step up or step aside'
- Equifax releases details on cybersecurity breach
- AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
- 7 Cybersecurity Questions Every Leader Should Ask
- Update CustomSettings.ini file remotely! | Keith's Consulting Blog
- Getting started with Docbook | Opensource.com
- Does Equifax Owe Victims a Duty of Care? - Lawfare
- Security Communication | Washington | Clear Security Communication
- On the Equifax Data Breach - Schneier on Security
- What's the Difference Between Zigbee and Z-Wave? Here's Everything You Need to Know
- Why the Equifax breach could force executives to finally take cybersecurity seriously - TechRepublic
- Connected Medicine and Its Diagnosis - Securelist
- InfoSec Handlers Diary Blog - Analyzing JPEG files
- Security Communication | Washington | Clear Security Communication
- Security Communication | Washington | Clear Security Communication
- NBlog - the NoticeBored blog: NBlog September 13 - surveying the corporate security culture
- Security Tools for the SMB and SME Segments
- Equifax felled by a months-old Apache Struts vulnerability – Naked Security
- BlueBorne - the Attack that Can Spread Malware without an Internet Connection
- Schumer calls for resignations unless Equifax offers better identity theft protections
- European Commission plans cybersecurity overhaul, giving ENISA more power
- FTC announces investigation into Equifax data breach
- Equifax Hackers Stole 200k Credit Card Accounts in One Fell Swoop — Krebs on Security
- Gauging Equifax's Future in Wake of Massive Breach
- Top Democrat Likens Equifax to Enron as FTC Launches Probe
- CDDC: One Secure Screen for Classified, Secret and Public Networks
- RDP Pivoting with Metasploit
- Bill creating an Office of Cyber Issues in the State Department proposed
- Senate bill calls for free credit freezes after Equifax breach
- Open Source Summit: Securing IoT is About Avoiding Anti-Patterns
- Caldwell Partners' Cyber Advisory Board Service | Linux Journal
- CSC - Elmer
- Penny Pinching With Open Source | The Networking Nerd
- Active Data Guard services in Multitenant - Blog dbi services
- Evil Tester: How to overcome Impostor Syndrome and use your brain's learning mechanisms to improve your public speaking skills
- Errata Security: People can't read (Equifax edition)
- What the Equifax breach means to me — an end user perspective | CSO Online
- Equifax's chief security and information officers are out
- Equifax: four simple steps to secure yourself – Naked Security
- The Equifax Breach: What You Should Know
- Penetration Testing on Remote Desktop (Port 3389)
- More fallout from Equifax data breach
- 10 steps for US multinational employers preparing for GDPR
- How to Fail Safe Your Data in the Cloud or When It’s Shared with 3rd Parties
- Unsupervised Learning
- Step by Step FTP Penetration Testing in Ubuntu
- Are US ad tech firms ready for the GDPR?
- Equifax breach exposes healthcare vendor vulnerabilities - Modern HealthcareModern Healthcare business news, research, data and events
- How does the Equifax data breach affect health care?
- Equifax's Colossal Error: Not Patching Apache Struts Flaw
- GitHub - A-mIn3/WINspect: Powershell-based Windows Security Auditing Toolbox
- Equifax’s Latest Data Breach: Argentina - HealthcareInfoSecurity
- antivirus versus antimalware
- Checkpoint Research Midyear Cyber Attack Trends 2017
- Latest Equifax Bungle: Predictable Credit Freeze PINs
- Cynic's Guide to the Equifax Breach: Nothing Will Change
- Installing Kali and Metasploitable on VirtualBox » Greenjam94's Infosec Blog
- AWS EC2, Default NAT, and Security Groups
- The Four Things a Service Business Must Get Right
- AWS IAM Security Terminology Primer
- Some Quick Takeaways from the 2017 Verizon DBIR
- How to Download Your LinkedIn Profile as a Resume
- Vizualize.me: Visualize your resume in one click.
- SSH: Practitioner Consideration Guidance download